1. Identify the cryptosystem that makes use of two different keys to encrypt and decrypt a message.
2. Access control right based on policy
1. Rule Based
2. Mandatory
3. Discretion
4. Role Based
3. Identify a connection-oriented protocol. ¬¬¬¬SHA-1 and MD5 are examples of which algorithm.
5. T or F: One of the factors of credential validation is somewhere you are.
6. T or F: Firewalls filters Internet traffic based on port implementation only.
7. Access control rights granted on the sensitivity of the data
1. Rule Based
2. Mandatory
3. Discretion
4. Role Based
8. What type of next generation technology grants access based on human attributes?
9. AES, DES, IDEA, and RC5 are examples of which algorithm.
10. T or F: One of the factors of credential validation is something you have.
11. What is a disadvantage of a host intrusion detection system?
12. Identify a limitation within a firewall as it pertains to data.
13. A combination of two types of intrusion detection systems are called
14. Access control rights granted based on the duties performed by a group
1. Rule Based
2. Mandatory
3. Discretion
4. Role Based
15. The result of applying an encryption algorithm to the original message.
16. What is the block cipher mode that incorporates the last encrypt block in the next block to be encrypted
17. The art of secret communication
1. Cryptanalyst
2. Cryptanalysis
3. Cryptography
4. Ctyptosystem
18. T or F: One of the factors of credential validation is something you had.
19. Which intrusion detection system provides near real time detection of potential threats?
20. T or F: IPSec encompasses the technology of AH and ESPN?
21. What is the difference between an intrusion detection system and a intrusion detection system?
22. T or F: SSL is used for HTTPS?
23. RSA, DSA, and Diffie-Hellman are examples of which algorithm.
24. T or F: One of the factors of credential validation is someone you knew
25. What is the DoD model equivalent to the OSI model called?
26. By signing a document with your digital signature you are not able to refute that you sent it. This is an example
27. At which layer of the OSI model does the protocol IP operates?
28. At which layer of the OSI model does the protocol TCP operates?
29. Identify a successful three-way handshake?
30. Identify the following ports:
• 443
• 25
• 110
• 8080
• 161
• 22
• 21